
126
4.1.2.
Using to Control Management Access
(Terminal Access Controller Access Control System) provides access control for networked devices
via one or more centralized servers. simplifies authentication by making use of a single database that
can be shared by many clients on a large network. uses TCP to ensure reliable delivery and a shared
key configured on the client and daemon server to encrypt all messages.
If you configure as the authentication method for user login and a user attempts to access the user
interface on the switch, the switch prompts for the user login credentials and requests services from the
client. The client then uses the configured list of servers for authentication, and provides results
back to the switch.
You can configure the server list with one or more hosts defined via their network IP address. You
can also assign each a priority to determine the order in which the client will contact them.
contacts the server when a connection attempt fails or times out for a higher priority server.
You can configure each server host with a specific connection type, port, timeout, and shared key, or you
can use global configuration for the key and timeout.
The server can do the authentication itself, or redirect the request to another back-end device. All
sensitive information is encrypted and the shared secret is never passed over the network; it is used only to
encrypt the data.
4.1.3.
Configuring and Applying Authentication Profiles
A user can access the switch management interface only after providing a valid user name and password
combination that matches the user account information stored in the user database configured on the
switch.
QNOS software include several additional features to increase management security and help prevent
unauthorized access to the CLI.
An authentication profile specifies which authentication method or methods to use to authenticate a user
who attempts to access the switch management interface. The profile includes a method list, which defines
how authentication is to be performed, and in which order. The list specifies the authentication method to
use first, and if the first method returns an error, the next method in the list is tried. This continues until all
methods in the list have been attempted. If no method can perform the authentication, then the
authentication fails. A method might return an error if, for example, the authentication server is
unreachable or misconfigured.
The authentication method can be one or more of the following:
enable—Uses the enable password for authentication. If there is no enable password defined,
then the enable method returns an error.
line—Uses the Line password for authentication. If there is no line password defined for the
access line, then the line method returns an error.
local— Uses the ID and password in the Local User Database for authentication. If the user ID
is not in the local database, access is denied. This method never returns an error. It always
permits or denies a user.
Summary of Contents for QuantaMesh QNOS5
Page 1: ...QuantaMesh Ethernet Switch Configuration Guide QNOS5 NOS Platform ...
Page 209: ...209 Table 7 8 IPv6 Neighbor Discovery Settings ...
Page 226: ...226 Table 8 2 L3 Multicast Defaults ...
Page 254: ...254 Appendix A Term and Acronyms Table 9 5 Terms and Acronyms ...